Purpose This critical review is to investigate steganographic studies and their methods to either exfiltrate data or defend against data exfiltration. Steganography has one main purpose, to conceal data. Huang’s (2011) method, embedding steganographic data in inactive frames of low-bit rate audio streams went against the norm (Aoki, 2008), (Wu et al., 2006), used active frames of high-bit rate audio streams. Active high-bit rate audio streams have higher least significant bit counts, which presents added frames to conceal steganographic payloads (Huang et al., 2011). Howbeit, Huang (2011) demonstrated a new algorithm he administered to (VOIP) inactive frames of low-bit audio streams, which could carry higher capacity payloads than …show more content…
Nagaraja’s (2011) research purpose was to initiate future studies into defensive measures against botnets. Botnets have a unique ability to coordinate the sending and receiving of new commands to bots that grant the botmaster immense power to execute criminal activities, such as, phishing attacks, DDoS attacks, and ransomware attacks (Nagaraja, et al., 2011). Which have intensified to where presently botnets control hundreds of thousands of hosts and produce millions of dollars in revenue for their creators (Nagaraja, et al., 2011). Contrary to traditional botnets, Stegobot’s communication traffic does not open new communication endpoints between the bots (Nagaraja, et al., 2011). Stegobot takes advantage of social media networks by operating along the edges, while utilizing image steganography techniques to hide covert communication during the interchanging of images among users (Nagaraja, et al., 2011). Network traffic visualization method designed by Mazurczyk (2012) focuses on network anomaly detection principles. Mazurczyk’s main purpose of doing his research was to detect anomalies in network traffic flow, that can cause malicious actions that could compromise network security. Typical anomaly detection methods instituted across networks focus on discovering illegal activities orchestrated by probable attackers (Mazurczyk, et al., 2012). Current security devices lack the effectiveness needed in today’s immense traffic volumes that need current real-time
tools will help to detect intrusions and other suspicious activities on the network. The third challenge is to improve the
// Globals to set the min and max coordinate values for moving Player and Enemies on the canvas
networks are also being targeted by malicious activity” [Overall statistics for 2014]. Many of the technologies used within these systems are now being exploited by criminals trying to access information and perform other criminal activities. The main reason for this is because most of the infrastructure in place is controlled by IT systems and the security systems in place
Abstract: Steganography is a kind of secret communication method used to hide secret data in some digital media such as images, audio etc. Cryptography and watermarking are other similar techniques. Data is secured using these methods, but the fact that data is present somewhere gives us a specific target, whereas sole purpose of steganography is that none must know there is some hidden data in the file. So, steganography easily has upper hand over cryptography and watermarking. Steganography can use almost all kinds of media present over internet to transmit secret data. In this paper, we review some audio steganography techniques, their algorithms and some challenges faced in their design and implementation. We will look in detail some modified techniques for audio steganography. Also, we look at the problems faced with using mp3 files as cover media.
Processes involved in the normal operation of a botnet has no comprehensive approach to either the stages encompassing the life cycle, or the lack of compartmentalization between them (see Figure 1, Botnet Life cycle Taxonomy). Apart from normal operations, so far there’s no qualitative analysis on how these stages should be characterized, defined, or distinguished. A proposed botnet life cycle stage starts with conception and ends with reaching the desired malicious intent, i.e. a successful attack and can include DDoS, spam, phishing, or click fraud. Corresponding mechanisms to these stages of the botnet life cycle are typically focused on attempting to hide the botnet (communication processes, location of the bots, and botmaster), some of these methods include IP spoofing, multi-hopping, polymorphism, and fast-flux networks. (Garcıa-Teodoro, Macia-Fernandez, & Rodrıguez-Gomez, 2012). Any defensive approach to overcoming a botnet is dedicated to preventing execution of a particular process in one of the botnet life cycle stages or combine processes in one or more stages. Deterring execution of a single stage in the botnet life cycle can thwart a malicious and devastating outcome. In principle, prevention of hidden mechanisms doesn’t suggest deterrence of the botnet goal, but increases the probability that a botnet will be identified by a defense method.
As discussed in the Problem Statement, there are several foundational flaws in the centralized architecture design of the C&C Botnets systems, which is leading the attackers to develop and use a Peer-to-Peer based control architecture designs like “Phatbot” [14], “Slapper” [12], “Nugache” [15], “Sinit” [13] etc., for the Botnet systems. These Peer-to-Peer based control architecture designs have multiple advantages like eliminating the need of using "Bootstrap" process which is a common process in P2P protocol. Another advantage of a P2P based architectures like “Nugache” is their ability to function undetected as they use a control channel which is encrypted [15]. Another advantage of a P2P based architectures like “Sinit” is their ability to provide sophisticated authentication by using public and private keys and cryptography [13]. Figure2 below illustrates the current “Command and Control Architecture of a C&C Botnet” [1]
Steganography is an ulterior, and lesser-known approach to private communication. Steganographic applications work by taking in three things: a cover work; this could be a picture, an audio file, a video file, etc., a message to be embedded, and a stego key; we don’t always use one but if we do it is much like an encryption key. Steganography applications will then embed the message into the cover work. This is most commonly performed using a method known as LSB embedding, which I will explain in detail.
A major security challenge on the Internet is the existence of a large number of compromised machines. Such machines are being increasingly used to launch various security attacks such as spamming and spreading malware, DDoS, and identity theft [1][3][6]. Two natures of the compromised machines on the Internet—sheer volume and being widespread—render many existing security countermeasures less effective and hence makes defending attacks involving compromised machines extremely
Steganography is the art of secret communication. Its purpose is to hide the very presence of communication as opposed to cryptography whose goal is to make communication unintelligible to those who do not possess the right keys. Digital images, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information can be used as “covers” or carriers to hide secret messages. After embedding a secret message into the cover-image, a so-called stego-image is obtained. It is important that the
Botnets a network of millions of computers under the control of an attacker which is used to carry out wide range of services, which includes include sending spam, hosting phishing attacks, committing online-advertising fraud, launching denial-of-service attacks etc. This botnets can employ attacks on all of the above categories. These are crafted for a particular purpose, which vary based on the preferences of the miscreant controlling the botnet, called a botnet herder. The size of botnets varies, the more important factor is what purpose they are being put toward. The Conficker botnet which was huge, infecting millions of computers but which is no harm full.
A distinctive steganographic application includes covert communications among two parties whose reality is unidentified to a promising attacker and whose achievement depends on detection of existence of communication. Host medium which
The internet is a medium that is becoming progressively important as it makes information available in a quick and easy manner. It has transformed communications and acts as a global network that allows people to communicate and interact without being limited by time, boarders and distance. However, the infrastructure is vulnerable to hackers who use the system to commit cyber crime. To accomplish this, they make use of innovative stealth techniques for their malicious purposes in the internet.
The threat of steganography has been known to the law enforcement community for years but how can the hidden information be found with the messages spread across the entire internet. Hidden messages were always transported through public settings, with there being so many web sites especially those that could easily be modified anonymously like Craigslist, Wikipedia and Google maps could lead to an infinite possibility of locations to hide information. (Shachtman, 2010) The only way that many of these web pages are tracked are through the use of an email address and IP addresses, both of which could easily be spoofed through the use of one time use accounts, anonymizers or web proxies. Hidden messages could be hidden using any of the steganography tools, within these public web sites simply by posting an article on
(2) Nagaraja (2011) conducted his research measuring communications between a botmaster and it's bots. (3) Nagaraja (2011) carried out a computational complexity theory design, Rudich (2004) to measure for unobservable communications channels connecting the botmaster and bots; to further hide secret communications between the botmaster and bots, Nagaraja (2011) used a version of steganography termed Stegobot. (4) The framework implemented for Nagaraja's (2011) research supported a quantitative method by using measurable properties such as channel efficiencies, channel bandwidth, duplication, botnet bandwidth, botcargo, and routing (Salkind,
The internet is everywhere. It has become the most widely used and accessed technology platform on the planet. It seems like it’s almost gotten to the point where your blender is going to need an IP address unless you want an outdated smoothie. So of course in this day and age when computing and online interaction has become so pervasive that it would be of paramount importance to protect your networks, your devices and yourself. Not only is cyber space ubiquitous, but cyber attacks as well. Every day worldwide countless governments, companies, and private citizens are subject to cyber attacks. The security world works round the clock in an attempt to stay ahead of the attackers. One of the most important tools that helps the security tools stay ahead of would be attackers are honeypots.